Skip to main content

Recycling Risks: Remove Your Digital Self

Visalia Direct: Virtual Valley
July 1, 2014 Deadline
August 2014 Issue

Recycling Risks: Remove Your Digital Self

Electronics, including our digital gadgets and computers, should be recycled. I encourage everyone to reuse or recycle devices, as long as they recycle wisely.

Green and blue recycling bins stand at the entrances of many major retailers. Cheerful signs encourage shoppers to deposit phones, tablets, and “other electronic devices.” The grocery store in our neighborhood has an electronics recycling station next to the coin counting machine.

If you can get a few dollars in return for doing the right thing, all the better. In the middle of a shopping mall, a kiosk declares, “Instant cash for your phone!” The machine doesn’t actually offer cash. Recyclers receive a mall gift card, which encourages immediate redemption.

One or twice a year, the major office supply chains announce computer and printer recycling programs. My wife and I traded-in old inkjet and laser printers for new models, taking advantage of instant rebates. We also recycle ink and toner cartridges, receiving coupons and gift cards in return.

My wife and I recycle computers by passing them along to friends and family. And, at least for another year or two, our tablets and smartphones are too new to be traded in. But, when it does come time to part with our current devices, we’ll be sure to practice safe recycling.

Too many people forget that phones and tablets store our entire lives. Failing to properly erase, or destroy, the data could lead to serious problems for you and other people in your life. Your phone, tablet and computer might also grant someone access to your employer’s data.

A friend who works at Goodwill Industries told me people fail to take proper precautions before bringing computers, phones and other devices to the drop-off center. Unless you properly erase data from your phone, tablet or other device, that information remains for any unethical recycling employee to access. A basic delete isn’t enough; you need to “wipe” information as securely as possible.

Goodwill employees examine each device for recklessly abandoned data, but other recycling services might not. And, although Goodwill does its best to protect donors, one unethical worker could steal the information from a donated device.

Only a few years ago, you could remove a phone’s SIM card (the “subscriber identification module”) and erase the stored numbers. Even if you lost a phone or donated without removing the SIM card, there was little risk. People tended to store partial names and phone numbers, nothing more, because using a 12-button pad to enter data was tedious.

Until I bought a smartphone, I never stored more than three numbers in my phone. Consider what we store in our phones’ memories today. My phone has my contacts, calendars, notes and much more. There are apps that connect automatically to various services I use, from my book wish lists to a half-dozen social networks. For a time, I had most apps set to ask for my passwords, but I hated entering passwords constantly to check my email or send a colleague a text message.

There are “Erase and Wipe” commands for Android, iOS and Windows devices. When you erase or reset a device, it might not remove the data. Instead, deleting a file on your phone or tablet only marks the memory as reusable. Computers do the same with hard drives.

Your computer is a treasure trove of personal and business data. A malevolent technician could locate anything from banking information to confidential employer documents. If you store data in the cloud, using services like DropBox and Google Drive, the applications and passwords might be stored on your computer, even if the data are not.

Marking the data “deleted” but not actually erasing it, reduces the wear on memory and storage media. That’s also why you can “undelete” files. Nothing is really gone until the memory or media has been overwritten repeatedly with other data. That’s also why erasing files leaves your confidential data at risk.

The “Wipe” command for a phone, tablet or computer might take hours to complete. Instead of marking the memory available for new data, the wipe command writes meaningless data to storage. Simple wipes replace any data with a blank, null or “zero” value. A common high-security wipe of memory or media writes random data, maximum data and then concludes by setting all memory to a blank state.

Some people assume that reformatting a hard drive is secure, but most operating systems default to a “quick format” that only marks the drive as blank without overwriting data.

Apple’s OS X Disk Utility allows you to overwrite a drive once, seven times or 35 times to securely erase data. The 35 rewrites option takes hours and only should be used with a mechanical hard drive. Do not erase a solid-state drive (SSD) more than once, or you can shorten its life significantly.

Microsoft and the Linux Software Foundation recommend KillDisk (killdisk.com) to wipe data from Windows and Linux storage media. The KillDisk utility offers similar options to Apple’s Disk Utility for multiple-pass overwriting of data.

Because my wife and I religiously backup our data using external hard drives, we have a storage bin filled with old drives that are beyond their expected lifespan. Most drives are rated for three to five years, and after five I don’t recommend trusting any storage device. I recently replaced a six-year-old external backup drive that works, but it was time to swap it for safety.

We keep the old drives for a couple of years, but there is point at which they serve no purpose. An ancient 120-megabyte IDE mechanical drive in a USB 1.1 enclosure should be recycled.

You can attach an older drive, reformat the drive and then take it to a recycling center. If you want to be more secure, the best way to render the data useless is to disassemble an old drive. Mechanical drives are sensitive devices; exposing the internal platters renders them useless.

I believe in recycling computing devices, but do it safely.

Comments

Popular posts from this blog

Comic Sans Is (Generally) Lousy: Letters and Reading Challenges

Specimen of the typeface Comic Sans. (Photo credit: Wikipedia) Personally, I support everyone being able to type and read in whatever typefaces individuals prefer. If you like Comic Sans, then change the font while you type or read online content. If you like Helvetica, use that.

The digital world is not print. You can change typefaces. You can change their sizes. You can change colors. There is no reason to argue over what you use to type or to read as long as I can use typefaces that I like.

Now, as a design researcher? I'll tell you that type matters a lot to both the biological act of reading and the psychological act of constructing meaning. Statistically, there are "better" and "worse" type for conveying messages. There are also typefaces that are more legible and more readable. Sometimes, legibility does not help readability, either, as a type with overly distinct letters (legibility) can hinder word shapes and decoding (readability).

One of the co…

Let’s Make a Movie: Digital Filmmaking on a Budget

Film camera collection. (Photo credit: Wikipedia) Visalia Direct: Virtual Valley
June 5, 2015 Deadline
July 2015 Issue

Every weekend a small group of filmmakers I know make at least one three-minute movie and share the short film on their YouTube channel, 3X7 Films.

Inspired by the 48-Hour Film Project (48hourfilm.com), my colleagues started to joke about entering a 48-hour contest each month. Someone suggested that it might be possible to make a three-minute movie every week. Soon, 3X7 Films was launched as a Facebook group and members started to assemble teams to make movies.

The 48-Hour Film Project, also known as 48HFP, launched in 2001 by Mark Ruppert. He convinced some colleagues in Washington, D.C., that they could make a movie in 48 hours. The idea became a friendly competition. Fifteen years later, 48HFP is an international phenomenon, with competitions in cities around the world. Regional winners compete in national and international festivals.

On a Friday night, teams gathe…

Edutainment: Move Beyond Entertaining, to Learning

A drawing made in Tux Paint using various brushes and the Paint tool. (Photo credit: Wikipedia) Visalia Direct: Virtual Valley
November 2, 2015 Deadline
December 2015 Issue

Randomly clicking on letters, the young boy I was watching play an educational game “won” each level. He paid no attention to the letters themselves. His focus was on the dancing aliens at the end of each alphabet invasion.

Situations like this occur in classrooms and homes every day. Technology appeals to parents, politicians and some educators as a path towards more effective teaching. We often bring technology into our schools and homes, imagining the latest gadgets and software will magically transfer skills and information to our children.

This school year, I left teaching business communications to return to my doctoral specialty in education, technology and language development. As a board member of an autism-related charity, I speak to groups on how technology both helps and hinders special education. Busin…